STE WILLIAMS

Brit watchdog fines child sex abuse inquiry £200k over mass email blunder

The UK’s data watchdog today issued the Independent Inquiry into Child Sexual Abuse (IICSA) a £200,000 penalty after it sent a bulk email to participants that identified possible victims of historical crimes.

The Information Commissioner’s Office (ICO) said IICSA – set up in 2014 to probe the degree to which institutions in England and Wales failed in their duty to protect young people from molestation – had breached the Data Protection Act (DPA) 1998 by not keeping confidential and sensitive personal data secure.

A employee of the inquiry fired a blind carbon copy (BCC) email to 90 people participating to inform them of a public hearing. Upon realising their error, a correction was issued but email addresses were mistakenly entered into the “to” field rather than BCC.

As a result, all recipients were able to view each other’s email addresses, highlighting other possible victims child sexual abuse. Some 52 of the addresses included full names or had a full name label attached.

One recipient notified IICSA of the breach, and they then entered two further email addresses into the “to” field before replying to all in the chain.

IICSA subsequently sent three emails requesting that the recipients delete the original email and not circulate it further, but one of these in turn led to 39 “Reply All” emails.

According to the ICO, the inquiry: failed to use an account that could send separate emails to each person involved in the cases; didn’t give guidance or training on BCC emails; hired an external IT firm to manage the mailing list and relied on advice from the third party that it would prevent email recipients from replying to the whole list; and shared those email addresses with the IT company in breach of its own privacy notice.

The ICO’s director of investigations, Steve Eckersley, said the breach placed “vulnerable” people “at risk” and the ICCSA “should and could have done more to ensure this did not happen”.

“People’s email addresses can be searched via social networks and search engines, so the risk that they could be identified was significant,” he added.

The ICO and IICSA were sent 22 complaints about the security breach, one from someone who said they were “very distressed” by it.

The breach was dealt with under the DPA 1998, not the 2018 Act that replaced it, due to the date of the breach in February 2017.

The Inquiry said it takes data protection “very seriously” and apologised to the victims impacted by this security breach.

“After a wide-ranging review by external experts, we have amended our handling processes for personal data to ensure they are robust and the risk of a further breach is minimised,” the IICSA said. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/18/ico_hands_sexual_abuse_inquiry_200k_fine_for_security_breach/

So long and thanks for all the fixes: ERPScan left out of credits on Oracle bug-bash list

Oracle fixed 17 flaws in its products found by ERPScan researchers without acknowledging the application security firm, which was recently and controversially sanctioned in the US.

hole

US tech companies sucked into Russian sanctions row

READ MORE

ERPScan said vulnerabilities it uncovered affect six different business applications. Left unpatched, they potentially allow attackers access to sensitive business data. The bugs range from remote code execution and cross-site scripting to authentication bypass and memory corruption.

The flaws spotted by ERPScan are among a record 334 addressed by Big Red’s latest quarterly patch batch. Some of these updates are cumulative but there’s still a hell of a lot to chew through, as explained in an analysis by the security outfit.

Oracle’s patch batch contained 61 vulnerabilities assessed as critical (CVSS base score 9.0-10.0). The most serious were in multiple Oracle products including Financial Services, Fusion Middleware, PeopleSoft, EBS, Retail Applications and more.

Among the bugs addressed was an authentication bypass vulnerability (CVE-2018-2894) that creates a remote code execution risk in WebLogic. The flaw, which scores 9.8/10, was discovered by noted bug hunter David Litchfield. “Oracle customers should test and roll out these patches as soon as possible,” Litchfield advised.

Two of the most severe vulnerabilities were identified by ERPScan researchers in the Oracle Fusion Middleware (CVE-2018-2894 and CVE-2018-2943).

Litchfield – unlike ERPScan – is one of 40 or so researchers credited for their work in uncovering weaknesses addressed by the patch batch.

ERPScan’s Elena Shapovalova was not best pleased that her firm had been left off the credit roll.

“Unfortunately, Oracle decided to dismiss ERPScan’s contribution and did not give a credit since ERPScan were put on a Treasury sanctions list,” she told El Reg.

“As we see it, Treasury sanctions only prevent financial transactions and do not prohibit non-financial relationships. It means that if research teams only send information on vulnerabilities to the vendor, nothing prevents this company to give them a credit.”

An expansion of sanctions on companies connected with Russia last month pulled in Embedi and ERPScan, as previously reported. Even though both firms are substantially US-based, they are both owned by Russian company Digital Security, which allegedly supplies tech help to Russian intelligence services.

Secret service agent in silhouette on white background

Sir, you’ve been using Kaspersky Lab antivirus. Please come with us, sir

READ MORE

El Reg invited Oracle to comment on its policy for dealing with ERPScan. The imposition of sanctions might be interpreted to preclude normal business relationships even outside of those where money doesn’t change hands. Oracle said it had receieved our inquiry but has yet to respond beyond that.

Shapovalova acknowledged Oracle’s quandary. “Sanctions always raise concerns, and the situation is not very promising for everybody,” she said.

ERPScan is one of few enterprise application security specialists in the industry. Finding flaws in enterprise resource planning packages and the like is a thinly covered area, particularly in comparison to the number of researchers looking for flaws in mobile apps, operating systems, browsers and elements of the Internet of Things.

ERPScan has been reporting security flaws in Oracle’s enterprise software since 2008. “This year has marked 10 years. And it seems we aren’t able to work this way any longer,” Shapovalova said.

She warned: “If we cannot officially help vendors keep their systems safe, enterprises can have insecure business applications, and their customers data (yours, your friend’s data, and mine) can be exposed to cybercriminals. It is debilitating for the whole industry.” ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/18/oracle_erpscan_credit_controversy/

From Bullets to Clicks: The Evolution of the Cyber Arms Race

Cyber strategies have become as important as physical weapons in the battle for political advantage. Here’s a quick look at four broad categories.

Political actors — including both superpowers and emerging economies — for decades have used cyberattacks, hacks, leaks, and malware to gain a political edge over their enemies and to keep their allies in line. One of the earliest and most notable events involved René Camille, comptroller general of the Vichy French Army and an agent for the French Resistance, who hacked the punched card system used by the Nazis to locate Jews in the early 1940s.

Over time, the scope, scale and sophistication of politically motivated attacks have increased alongside their malicious intentions. In 2004, North Korea trained an army of 500 hackers who sabotaged South Korea’s computer networks. Flash forward to the present and the US is accusing Russia of targeting its energy infrastructure.

Cyber strategies have become just as important as physical arms in the battle for world supremacy. Here is a quick look at four broad categories these new cyber forces execute through clicks rather than triggers.

Nation-State Warfare
Political actors are adding cyber weapons to their arsenal since they have a number of distinct advantages over traditional bombs and missiles. They are less expensive (the cost of just one Tomahawk cruise missile hovers around $1.8 million), and attackers can activate them at a moment’s notice. Moreover, retaliation is not as likely because attribution is so difficult and loss of life is likely to be far less than in direct combat.

One recent example is the sabotage of missiles and missile programs rather than relying solely on unreliable and expensive antimissile interceptors. This tactic has strategic appeal because the adversary may suspect a technical flaw rather than sabotage. For instance, the US built the so called “left-of-launch” capability aimed at disabling North Korea’s nuclear missile systems on the ground prior to launch. In the case of Iran, the US built and deployed project Nitro Zeus as a cyber alternative to full-scale war.

Political-Influence Campaigns
Using cyber means to distribute misinformation and propaganda and instill controversy, confusion, doubt, and anger among targeted populations has grown in popularity. Russia’s influence on the US elections (from the Democratic National Convention hack to social media troll farms and millions of ads) is well documented. Overall, Russia is suspected of political meddling in 27 countries since 2004.

Although not as infamous as Russia, other countries have also leveraged cyber tactics for political gains. The United Arab Emirates (UAE) and Qatar stand accused of hacking emails, releasing “dirt” and weaponizing fake news to influence American policy on both Iran and the stance on a UAE-led blockade of its country. Even less industrialized nations, such as Vietnam, are going cyber for political advantage. Vietnam is suspected of hacking and releasing sensitive Philippine documents, including a transcript of a phone call between President Trump and President Duterte, in an apparent attempt to derail the Philippines from strengthening ties with the US and China.  

Spying Campaigns
Many countries with less-than-stellar human rights records have deployed cyber weapons as surveillance tools against their own citizens. These can be homemade or tools purchased from cyber-arms dealers. Examples include: China’s focus on dissidents and political activists in Hong Kong, Mexico’s hacking and tracking of journalists, Pakistan’s surveillance of human rights defenders, and Iran’s cyber harassment of protesters.

Nation-State Digital Espionage
In addition to leveraging expensive spies, countries have been using digital espionage for over half a century. With most sensitive data now available in digital format on network-accessible servers, this type of espionage has proven to be extremely powerful and allows for fast access to troves of information. China’s hack of the Office of Personnel Management as well as its alleged theft of F-35 blueprints are examples of this type of cyberattack. The US government also engages in spying campaigns, as revealed by Edward Snowden.

What’s next? Just like their physical counterparts, cyber arms will continue to become more advanced and pervasive. They are also becoming more “democratized” and accessible to developing countries that we do not normally associate strong military capabilities with. Eventually, cyber weapons will turn out to be more influential than the military in determining world supremacy.

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Register before July 27 and save $700! Click for more info

Nir Gaist is a senior information security expert, ethical hacker, and a gifted individual. He started programming at age 6 and began his studies at the Israeli Technion University at age 10. Nir holds significant cybersecurity experience after serving as a security … View Full Bio

Article source: https://www.darkreading.com/endpoint/from-bullets-to-clicks-the-evolution-of--the-cyber-arms-race-/a/d-id/1332273?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft Moves Up As Phishers’ Favorite Target for Brand Spoofing

Researchers compiled a list of the most common brands to impersonate by detecting and analyzing new phishing URLs.

Microsoft is cybercriminals’ favorite brand to impersonate in phishing attacks, following a 57% increase in phishing URLs detected during Q2 2018, Vade Secure reports.

The boost propelled Microsoft past PayPal and Facebook, which fell into second and third place, respectively, on the inaugural Phishers’ Favorites list. Researchers tallied the number of new phishing URLs detected in the company’s filter engine to compile their list of most commonly spoofed brands.

Microsoft took the top spot because it’s highly profitable to compromise an Office 365 account, researchers report. Email-based attacks are seen as an easy entry point into a treasure trove of data, files, and contacts from other Office 365 apps, such as OneDrive, SharePoint, and Skype.

PayPal was a distant second due to a 16% increase in phishing URLs; however, it remains heavily targeted as the most broadly used online payment service, with 237 million users. Facebook fell two spots to No. 3 after a 54% decline in phishing URLs. The social media giant has historically been a popular target but is less common after it ramped up security efforts following the Cambridge Analytica scandal.

Read more details here.

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/microsoft-moves-up-as-phishers-favorite-target-for-brand-spoofing/d/d-id/1332321?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft to pay new bounties for identity services holes

Microsoft’s launched a new bug bounty program, this time for identity services.

“Microsoft has invested heavily in the security and privacy of both our consumer (Microsoft Account) and enterprise (Azure Active Directory) identity solutions,” wrote principal security group manager Phillip Misner.

But Redmond’s not just paying to protect itself: the new bounties will also be on offer for some implementations of the OpenID specs.

Misner said Microsoft’s extended its largesse to OpenID because it knows its own authentication technologies need to work alongside standards-based efforts.

“If you are a security researcher and have discovered a security vulnerability in the Identity services, we appreciate your help in disclosing it to us privately and giving us an opportunity to fix it before publishing technical details,” Misner wrote. Doing so could score you between US$500 and $100,000.”

To be eligible for the cash Microsoft says you’ll need to find something nasty that impacts one of the following login tools:

  • login.windows.net
  • login.microsoftonline.com
  • login.live.com
  • account.live.com
  • account.windowsazure.com
  • account.activedirectory.windowsazure.com
  • credential.activedirectory.windowsazure.com
  • portal.office.com
  • passwordreset.microsoftonline.com
  • Microsoft Authenticator for iOS and Android

Further, the bug you find will need to:

  • Identify an original and previously unreported critical or important vulnerability that reproduces in our Microsoft Identity services .
  • Identify an original and previously unreported vulnerability that results in the taking over of a Microsoft Account or Azure Active Directory Account.
  • Identify an original and previously unreported vulnerability in listed OpenID standards or with the protocol implemented in our certified products, services, or libraries.
  • Submit against any version of Microsoft Authenticator application, but bounty awards will only be paid if the bug reproduces against the latest, publicly available version.
  • Include a description of the issue and concise reproducibility steps that are easily understood. (This allows submissions to be processed as quickly as possible and supports the highest payment for the type of vulnerability being reported.)
  • Include the impact of the vulnerability
  • Include an attack vector if not obvious

It’s not hard to see why Microsoft has decided its ID services are a good target for bounty hunters: the company has hundreds of millions of registered users, which makes it a target so big that bad actors are surely already have all the motivation they need. Offering them an alternative, while also giving white hats more incentive, is a neat crowdsourcing play.

Legend also has it that remnants of Banyan Vines lurk within the heart of Active Directory and surely that venerable product deserves some new attention in case an ancient horror could emerge to threatens us anew today. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/18/microsoft_identity_services_bounties/

PayPal’s pal Venmo spaffs your pals’ payments – and yours

PayPal-owned digital wallet Venmo shares way too much data via its public API, according to Berlin-based researcher Hang Do Thi Duc.

If users accept the default setting on their account when they sign up, Do Thi Duc found that their transaction details are accessible via the service’s API, making it “incredibly easy to see what people are buying, who they’re sending money to, and why”, she wrote.

The API is visible at Venmo here. It allowed Do Thi Duc to download more than 200 million transactions processed in 2017. The researcher said “I learned an alarming amount” about users, their transactions, and what they were buying.

Including cannabis (thanks to records of a seller with more than 900 transactions last year), food, romantic gifts, pizzas, AirBNB rents – all carrying personal info far beyond what most Venmo users think is public.

Venmo on phone

PayPal probed over Venmo cash-flinging app

READ MORE

Venmo seems quite proud of the API’s power, since this link shows the most recent transaction, whatever it might be, from a user who hasn’t marked their settings as “private” in the app.

“I think it’s problematic that there is a public feed which includes real names, their profile links (to access past transactions), possibly their Facebook IDs and essentially their network of friends they spend time with,” Do Thi Duc wrote.

Venmo told The Guardian “Our users trust us with their money and personal information, and we take this responsibility and applicable privacy laws very seriously. Like on other social networks, Venmo users can choose what they want to share on the Venmo public feed”.

At the time of writing, the API links posted by Do Thi Duc are still active, however The Register notes some API references have been taken down.

As the screenshot below shows, Google has at some point indexed the URL for Venmo’s API documentation at https://venmo.com/api.

Venmo Googled screenshot

Click to enlarge

This now redirects back to the company’s home page. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/18/venmo_spaffs_transactions_to_worlddog/

Scumbag confesses in court: LuminosityLink creepware was my baby

A US software developer has admitted to selling and supporting spyware after originally claiming his remote access tool was legitimate admin software.

Colton Grubbs agreed to plead guilty to three felony charges – two counts of conspiracy, and one count of removal of property to prevent seizure – in a US federal district court in Lexington, Kentucky, in exchange for seven other charges being dropped.

Grubbs admitted on Monday to the court that his software, LuminosityLink, was being used for illegal surveillance and remote access, and that he was aware of the fact, and had actively marketed and sold the software with the intent of enabling criminals.

At its peak, LuminosityLink, which sold for $39.99, had around 6,000 customers, and could be installed on Windows PCs to spy on the machines’ owners. The idea is you sneak it onto a target’s computer via malicious downloads, or on an unattended PC, and so on. Once in place, the software can be remotely connected to in order to surveil the target. Perfect for screwing over spouses, partners, bosses, and other victims.

Grubbs even enlisted a small group of volunteer staff to help provide tech support for the tool’s customers.

“Defendant claimed that LuminosityLink was a legitimate tool for systems administrators, but knew that many customers were using his software to remotely access and control computers without their victim’s knowledge or permission,” the plea deal [PDF] reads.

“Defendant’s marketing emphasized these malicious features of LuminosityLink, including that it could be remotely installed without notification, record the keys that a victim pressed on their keyboard, surveil victims using their computer cameras and microphones, view and download the computer’s files, steal names and passwords used to access websites, mine and earn virtual currency using victim computers and electricity, use victim computers to launch DDoS attacks against other computers, and prevent anti-malware software from detecting and removing LuminosityLink.”

Fancy Bear Anonymous bear logo

Fancy that, Fancy Bear: LoJack anti-laptop theft tool caught phoning home to the Kremlin

READ MORE

Additionally, Grubbs copped to hiding his hard drives, debit card, and phone from investigators when they came to search his apartment, then shifting his business’ Bitcoin stash to satellite accounts, and telling one of his other support staff to hide evidence.

Though Grubbs had plead not guilty when first arraigned back in June, his lawyer indicated earlier this month that a plea deal was likely to be reached. As the deal notes, both sides agreed the feds had pretty solid evidence against the developer.

Grubbs faces up 20 years in prison (but will likely get far less) when he is sentenced in October.

Grubbs is the third developer in recent months to catch a felony rap for developing and selling tools for use by hackers. Earlier this year a court sentenced Taylor Huddlestone to 33 months for selling a remote access tool, while former college comp-sci whiz kid Zachary Shames was given a six month sentence in January for selling a keylogger out of his dorm room. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/17/luminositylink_creepware_developer_guilty/

Blood test biz LabCorp pulls plug on systems over hacker fears

Medical biz LabCorp shut down some of its systems last week after it detected “suspicious activity” on its network.

A company spokesperson told The Register that, contrary to early claims the “entire network” was shut down and “millions” of records swiped, only its Diagnostics service was affected – the Covance pharmaceutical operation remained untouched, apparently – and so far there is no indication any medical records were accessed or stolen.

“During the weekend of July 14, 2018, LabCorp detected suspicious activity on its information technology network. LabCorp immediately took certain systems offline as part of its comprehensive response to contain the activity. This temporarily affected test processing and customer access to test results over the weekend,” LabCorp’s spokespeople told us.

“Work has been ongoing to restore full system functionality as quickly as possible, testing operations have substantially resumed today, and we anticipate that additional systems and functions will be restored throughout the next several days. Some customers of LabCorp Diagnostics may experience brief delays in receiving results as we complete that process.”

LabCorp, based in Burlington, North Carolina, said it has notified the authorities, and intends to cooperate in any investigation.

Unless new developments take a turn for the worse, the intrusion will be a bullet dodged for LabCorp, which operates a nationwide string of health, forensics, and genetics-specialized testing facilities.

The health firm runs small test facilities in cities around the US. If, for example, your doctor orders a cholesterol test or liver panel, chances are you go to a small LabCorp facility to get your blood drawn. The company employs about 60,000 people and its annual revenues last year were $10.3bn.

Needless to say, the biz has a vast number of personal health records and test results to manage – and potentially lose control of. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/17/labcorp_security_concern/

White House Cybersecurity Strategy at a Crossroads

Trump administration’s initial lack of a unified front in the wake of Russian election-hacking indictments worries cybersecurity experts.

Fallout from a rapid-fire series of developments surrounding the 2016 election hacking and meddling by Russia continued today as President Donald Trump attempted to walk back his public dismissal yesterday of his intelligence agencies’ findings pointing to Russia.

The chaos from Trump’s apparent disconnect with his intelligence officials and others in the administration underscores concerns that the administration’s cybersecurity strategy may be unraveling.

The latest chapter began late Friday with the bombshell federal indictments of 12 Russian military officers for alleged hacking and leaking in an orchestrated effort to tip the scales toward Trump’s presidential run by damaging Clinton’s candidacy.

The detailed indictment provided names of the Russians, as well as how they led the hacks of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and employees of Democratic presidential candidate Hillary Clinton’s campaign, and waged strategic leaks online. In addition, they infiltrated the website of a state election board and pilfered information on 500,000 voters as well as breached a software supplier that verifies voter registration information.

But yesterday, after a private meeting with Russian President Vladimir Putin in Helsinki, Trump publicly disputed his own US intel agencies’ findings and sided with Putin’s denials. After the press conference, Trump’s director of national intelligence Daniel Coats, issued a statement standing by the US intelligence findings. 

Trump attempted a little damage control today back at the White House. But he still stopped short of fully calling out Russia as the perpetrator: Trump said that it could also be someone other than Russia behind the election hacks and meddling.

“I have full, great faith in US intelligence,” he said today at the White House after meeting there with congressional leaders. “The Russians had no impact at all on the outcome of the election … I accept our intelligence community’s conclusion that Russia’s meddling in the 2016 election took place,” Trump said, adding, “Could be other people also.”

Trump said he misspoke at one point during the press conference with Putin. He said he actually meant to say the word “wouldn’t,” not “would” when he stated: “I don’t see any reason why it would be Russia” behind the hacks. 

Meanwhile, Trump said the US will “aggressively repeal and repel any efforts to interfere in our elections” and that his administration has taken “strong action to secure our election systems and the process.”

The Race is On

The US Department of Homeland Security (DHS) indeed been reaching out to states and other related parties to offer assistance for securing their election systems. But getting all states and municipalities on board with the proper security tools and practices with the nation’s disparate election and voting systems is a huge challenge.

“Elections are still very local, the federal government must still be invited to the table, and as a result we have a fractured system that is impossible to secure,” says Chris Pierson, CEO of Binary Sun Cyber Risk Advisers. Pierson notes that the priority systems to secure – in tight or pivotal races, for example – will be a moving target from election to election. He says many US election systems and databases already are likely compromised.

But Ron Gula, president of Gula Tech Adventures, says it’s not the voting machines he’s worried about. He says there are more insidious ways nation-states like Russia could disrupt this election, like attacking the systems that report voting results to the media, for example. “That could tip an election” with early results that ultimately discourage turnout, for example, he says. And campaign workers are an obvious and easy target for phishing attacks, since these organizations are typically not well-funded and less likely to be able to afford two-factor authentication and other security measures.

The Russian military hacking teams from the GRU also stole more data than they leaked in 2016, including information from the Republication National Committee (RNC) and other targets. They could use the as-yet unknown stolen information, or other hacks, to repeat their previous operation this fall and in future elections, experts say.

Tom Kellermann, chief cybersecurity officer at Carbon Black, expects more Russian cyberattacks if the fall election swings out of Trump’s favor and into that of the Democrats’. “Putin will take the gloves off then,” he says. “And even if [Russia] feel they are winning, they aren’t going to slow their hacking.”

Russia’s hacking teams already have been spotted in energy networks in the US: the Trump administration in March called out Russia for targeting its power grid. 

The White House cybersecurity coordinator position, which was vacated by former head Rob Joyce in April, was quietly eliminated altogether. Politico in May reported that it had obtained an email to the White House National Security Council staff from John Bolton aide Christine Samuelian: “The role of cyber coordinator will end,” in an effort to “streamline authority” in the NSC, which includes two senior cybersecurity directors, she said in the email, according to Politico.

Trump’s cybersecurity policy hasn’t evolved much, and the lack of a cybersecurity coordinator may be partly why, experts say. “I think we really need somebody in there to make sure we have the right technology and approach across all leadership in government: in Congress and major agencies,” Gula says.

Kellermann says while the administration still can set cybersecurity policy without someone in that position, having a cybersecurity coordinator can help bridge the various government departments. “A problem in DC is that people don’t want to listen to other departments,” he says.

Meanwhile, Trump’s reluctance to strongly condemn Putin and his GRU for their hacking campaign during the presidential election isn’t helping demonstrate a strong cybersecurity front for the US, experts say. That could leave the US vulnerable.

But it appears the key players in the nation’s cyber defense aren’t getting tripped up by the political battles. According to a report in The Washington Post, Paul Nakasone, director of the NSA and head of the US CyberCommand, already has the two organizations working on fighting back any Russian cyberattacks on the 2018 election. 

But Michael Hayden, a former CIA director and NSA director, said those efforts are not sufficient to protect the US. “Nakasone, and the heads of the other three-letter agencies, are doing what they can in their own lanes, absent an overall approach directed by the president,” he told The Post. “As good as it is, it’s not good enough. This is not a narrowly defined cyberthreat. This is one of the most significant strategic national security threats facing the United States since 9/11.”

Related Content:

 

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/white-house-cybersecurity-strategy-at-a-crossroads/d/d-id/1332318?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Look, what’s that over there? Sophos nips Windows DNS DLL false positive in the bud

A Windows operating system library was wrongly identified as malware by Sophos’s antivirus scanner for some users on Tuesday.

Security software from Sophos quarantined dnsapi.dll, provoking a modest number of complaints on the antimalware maker’s support forums. The main gripe seemed to be bogus alerts generated by the software, rather than crashed systems, a not infrequent side-effect of erroneously putting Windows library files into quarantine.

Influential UK infosec geezer Kevin Beaumont highlighted the cockup, and soon after El Reg began prodding Sophos about the issue, the false positives were cancelled and normality was restored.

How much pain, confusion and general inconvenience did the incident cause? Probably not much, it would seem, mostly because the issue was quickly resolved.

bluejean

Brown pants moment for BlueJeans: Dozens of AV tools scream its vid chat code is malware

READ MORE

In a knowledge base article, Sophos said the false alarm centered around a temporary file created when Windows Update was upgrading dnsapi.dll, and not the final library file, a small but important distinction that drastically limited the impact of the issue.

This problem, such as it was, is known to affect Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 only – the operating systems targeted by the Windows Update patch that triggered the false alarm. That patch is supposed to fix up “an issue where DNS requests disregard proxy configurations in Internet Explorer and Microsoft Edge.”

False positives are a well-known Achilles Heel of security scanners. Even though signature-based detection is only one of the layers of protection offered by modern security software, it’s still in there and it can still go wrong, occasionally.

Quality control has improved over the years but the sheer volume of malware out there means that frequent signature updates have become par for the course. Accidents will happen, so the trick becomes to respond quickly when problems crop up, a process Sophos seems to have done pretty well on this occasion. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/17/sophos_false_positives/